mail archive of the barebox mailing list
 help / color / mirror / Atom feed
From: Jonas Rebmann <jre@pengutronix.de>
To: Sascha Hauer <s.hauer@pengutronix.de>
Cc: BAREBOX <barebox@lists.infradead.org>,
	Ahmad Fatoum <a.fatoum@pengutronix.de>
Subject: Re: [PATCH v2 15/17] crypto: concatenate fit development certificate with private key
Date: Tue, 4 Nov 2025 12:14:38 +0100	[thread overview]
Message-ID: <d1f5865d-1223-4741-a744-4832a6504576@pengutronix.de> (raw)
In-Reply-To: <aQnRVNvuEYy32a19@pengutronix.de>

Hi Sascha,

On 2025-11-04 11:11, Sascha Hauer wrote:
> On Mon, Nov 03, 2025 at 12:41:14PM +0100, Jonas Rebmann wrote:
>> Hi Sascha,
>>
>> On 2025-11-03 11:08, Sascha Hauer wrote:
>>> On Tue, Oct 28, 2025 at 07:03:20PM +0100, Jonas Rebmann wrote:
>>>> Merge the exemplary keys copied in from [1] into a single pem file,
>>>> in a manner similar to test/self/development_rsa2048.pem for consistency
>>>> and to reduce clutter a bit.
>>>>
>>>> While at it, rename them from "fit-" to "snakeoil-" as they are not only
>>>> used for fit, but also for tlv integration tests, and to indicate more
>>>> clearly that these are publicly known keys.
>>>
>>> Should we rather keep the "fit" name and add another key for tlv
>>> integration tests?
>>
>> I'd rather not add more 'compromised' keys to the repo. What would be
>> the gain?
> 
> My thinking was that with this we could make sure that during tests
> actually a key from the desired keyring is used.
> >> I think naming it snakeoil gives it the warning it deserves. We should
>> make it hard for anyone to confuse our CI/Development keys with their
>> production keys.
> 
> Indeed. I just don't like the term "snakeoil" here.
> 
>  From wikipedia:
> 
> "Snake oil" is a term used to describe deceptive marketing, health care fraud, or a scam.
> 
> We don't do anything like this here. We're not trying to sell snake oil.
> 
> I am open for something like "testing" or "development".

I thought this to be a conventional name specifically for keypairs
shipped with software like the debian packages qemu-efi-aarch64 and
ovmf:
https://packages.debian.org/search?searchon=contents&keywords=snakeoil&mode=filename&suite=stable&arch=any

The ssl-cert debian package runs make-ssl-cert generate-default-snakeoil
in its postinst script:

    Invoked with "generate-default-snakeoil", it will generate
    /etc/ssl/certs/ssl-cert-snakeoil.pem and /etc/ssl/private/ssl-cert-
    snakeoil.key.

Other packages do similar things.

I understand "snakeoil" in this context as: 'It may look like it heals
your confidentiality and integrity pains but will be greatly ineffective
for this, don't be deceived!'

> Also we might want to add a runtime message like:
> 
> "WARNING: This barebox binary contains well known keys and is unsecure"

This is a good idea and I'd also suggest in the future to write pytest
fixtures that let us generate testing key material on the fly. It seems
like a task for a different day so would you be ok with leaving it as-is
for now?

Regards,
Jonas

-- 
Pengutronix e.K.                           | Jonas Rebmann               |
Steuerwalder Str. 21                       | http://www.pengutronix.de/  |
31137 Hildesheim, Germany                  | Phone: +49-5121-206917-0    |
Amtsgericht Hildesheim, HRA 2686           | Fax:   +49-5121-206917-9    |



  reply	other threads:[~2025-11-04 11:15 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-10-28 18:03 [PATCH v2 00/17] TLV-Signature and keyrings Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 01/17] lib: idr: avoid dangling else in idr_for_each_entry() Jonas Rebmann
2025-11-03 10:11   ` Ahmad Fatoum
2025-10-28 18:03 ` [PATCH v2 02/17] common: clean up TLV code Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 03/17] crypto: Add support for keyrings Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 04/17] fit: only accept keys from "fit"-keyring Jonas Rebmann
2025-11-03  9:04   ` Sascha Hauer
2025-10-28 18:03 ` [PATCH v2 05/17] crypto: keytoc: Rename "hint" to "fit-hint" and do not use it in identifiers Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 06/17] commands: keys: update output format to include keyring Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 07/17] commands: tlv: Error out on invalid TLVs Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 08/17] scripts: bareboxtlv-generator: Implement signature Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 09/17] scripts: bareboxtlv-generator: Increase max_size in example schema Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 10/17] common: tlv: Add TLV-Signature support Jonas Rebmann
2025-11-03 10:02   ` Sascha Hauer
2025-11-03 11:21     ` Jonas Rebmann
2025-11-03 11:41       ` Sascha Hauer
2025-11-03 11:55         ` Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 11/17] common: tlv: default decoder for signed TLV Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 12/17] crypto: Use "development" keys for "fit" and "tlv" keyring Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 13/17] test: py: add signature to TLV integration tests Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 14/17] ci: pytest: Add kconfig fragment for TLV signature " Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 15/17] crypto: concatenate fit development certificate with private key Jonas Rebmann
2025-11-03 10:08   ` Sascha Hauer
2025-11-03 11:41     ` Jonas Rebmann
2025-11-04 10:11       ` Sascha Hauer
2025-11-04 11:14         ` Jonas Rebmann [this message]
2025-10-28 18:03 ` [PATCH v2 16/17] doc/barebox-tlv: Update documentation regarding TLV-Signature Jonas Rebmann
2025-10-28 18:03 ` [PATCH v2 17/17] Documentation: migration-2025.11.0: List changes to CONFIG_CRYPTO_PUBLIC_KEYS Jonas Rebmann
2025-11-03 10:16   ` Sascha Hauer
2025-11-03 10:26     ` Ahmad Fatoum
2025-11-03 10:41       ` Sascha Hauer
2025-11-03 10:45         ` Ahmad Fatoum

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=d1f5865d-1223-4741-a744-4832a6504576@pengutronix.de \
    --to=jre@pengutronix.de \
    --cc=a.fatoum@pengutronix.de \
    --cc=barebox@lists.infradead.org \
    --cc=s.hauer@pengutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox